Determining How to Allocate Your Cybersecurity Budget

Protecting What Matters: Determining How to Allocate Your Cybersecurity Budget How to spend your next cyber dollar is a question you’ve asked yourself, and has likely been asked by your leadership team. The answer to that question should actually be straightforward: if it isn’t, then you should be reflecting on your entire cyber maturity program – not just deciding on which purchase order to […]

Strategies to Defend Against the 15 Common Cyber Attack Vectors

15 Cyber threats

Cybersecurity is a critical aspect of today’s digital age, where individuals and organizations are susceptible to cyber attacks. As we rely more on technology, cyber attacks become increasingly prevalent, and attackers continue to find new methods to exploit systems. In 2022 alone, Canada saw a 20% increase in cyber attacks[1], while the global numbers increased […]

Time to Rally the Retail Troops: A Guide to Strengthening Cybersecurity in Retail

A Guide to Strengthening Cybersecurity in Retail

Cybersecurity needs to be a priority for retailers, now more than ever. While some retailers were among the early adopters in the evolution of e-commerce in the 2000s, the pandemic accelerated digital transformation right across the board in the retail industry. According to a Retail Data Threat Report by Thales, over 70% of U.S. retailers […]

Education Under Cyber Attack

education under cyber attack

Six FAQs about what’s happening, why, and what we can do about it 1. Why are schools under cyber attack? There are several factors involved. First off, educational institutions have a wealth of sensitive data. Consider that schools hold health information, financial information, academic performance records, personal student and faculty records, and more. Further, note […]

Top 10 Tips for Healthcare Cybersecurity

Top 10 tips for healthcare cybersecurity

Healthcare organizations and their third-party suppliers are consistently among the most frequently targeted by cyber criminals, and now even nation-states. The criticality of the services provided, combined with the wealth of sensitive information held by medical organizations and the challenges in keeping systems up to date, have made healthcare breaches an all-too-frequent headline. So, what […]

A buyer’s guide for choosing the best SIEM for your business

buyer guide for SIEM

A brief history Security Incident and Event Management (SIEM) technologies have been around for decades. They were originally designed to bring order to the chaos of security and event alerts generated by the ever-increasing number of IT systems in production environments. Technical staff find it complex enough monitoring alarms on a single file server – […]

How to Get Board Buy-in for Cybersecurity Investment

board buy-in cybersecurity investment

Even in today’s climate of constant threat of cyber attack, IT professionals may still encounter challenges in getting the cybersecurity message across to their board of directors. Here are some strategies for helping to raise visibility, awareness, and support for cybersecurity initiatives at your organization. Preparation While your exposure to the board may be limited […]

Three ways AI and ML can improve cybersecurity

Artificial intelligence (AI) and machine learning (ML) aren’t just buzz words anymore – they are key components of today’s cybersecurity landscape. Why? The rate of change in technology, the volumes of data involved, and sophistication of attackers – coupled with the well-documented global shortage of cybersecurity talent – have made it essential to leverage modern […]

How to adapt to the Great Cyber Reset

How to adapt to the Great Cyber Reset

Written by Phil Armstrong, President & CEO, Macanthium Ventures In the beginning… When computers were first introduced as strategic business tools, we operated a rather medieval architecture to protect our corporate assets and customer data. We built a perimeter around our data centre “castle” and funneled all inbound and outbound digital interactions across an electronic […]

SUBSCRIBE

Get monthly proprietary, curated updates on the latest cyber news.